A Comprehensive Study in Data Mining Frameworks for Intrusion Detection
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 7)Publication Date: 2012-01-26
Authors : R.Venkatesan; R. Ganesan; A. Arul Lawrence Selvakumar;
Page : 29-34
Keywords : Data Mining; Intrusion Detection System (IDS); Network Security; Misuse Detection; Anomaly Detection; Classification; Clustering; MADAM ID; ADAM; JAM;
Abstract
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on expanding every day. An Intrusion Detection System (IDS) is a system for detecting intrusions and reporting to the authority or to the network administration. Data mining techniques have been successfully applied in many fields like Network Management, Education, Science, Business, Manufacturing, Process control, and Fraud Detection. Data Mining for IDS is the technique which can be used mainly to identify unknown attacks and to raise alarms when security violations are detected. The purpose of this survey paper is to describe the methods/ techniques which are being used for Intrusion Detection based on Data mining concepts and the designed frame works for the same. We are also going to review the related works for intrusion detection.
Other Latest Articles
- Semantic Web Mining: Benefits, Challenges and Opportunities
- T-Learning: An Interactive Learning Services Framework for Indian Educational Broadcasts
- An Evaluation of Two Mammography Segmentation Techniques
- Real Time Scheduling Services for Distributed RT-CORBA Applications
- Baseline Requirements and Architecture for Cloud Computing Services
Last modified: 2014-11-25 19:18:49